| Line 1: | 
Line 1: | 
|   | + |  | 
|   | {{Cloud Information Centre - Government of Canada}}  |   | {{Cloud Information Centre - Government of Canada}}  | 
|   | <b>  |   | <b>  | 
|   | </b>  |   | </b>  | 
|   | + | <!-- NAV -->  | 
|   | <!-- Columns -->  |   | <!-- Columns -->  | 
|   | + |  | 
|   | + | {| width="100%" cellpadding="10"   | 
|   | + |  | 
|   | + | |width="90%" style="color: black;" align="right" |   | 
|   | + | <!-- COLUMN 1 STARTS: -->   | 
|   | + | [[Template: Politique|Français]]   | 
|   | + | <!-- COLUMN 1 ENDS: -->   | 
|   | + | |width="10%" style="color: black; align=center" |   | 
|   | + |  | 
|   | + | <!-- COLUMN 2 STARTS: -->   | 
|   | + |  | 
|   | + | <!-- COLUMN 2 ENDS: -->   | 
|   | + |  | 
|   | + | <!-- Columns -->  | 
|   | + | |}  | 
|   |  |   |  | 
|   | {| width="100%" cellpadding="10"    |   | {| width="100%" cellpadding="10"    | 
| Line 70: | 
Line 87: | 
|   | ::*	[https://nam06.safelinks.protection.outlook.com/?url=https://www.cse-cst.gc.ca/en/node/1830/html/26507&data=02|01|Jamie.Hart@microsoft.com|7503434d3e8c4c8cc23808d68d7d1039|72f988bf86f141af91ab2d7cd011db47|1|0|636851965624128440&sdata=TDPmXQvqrn0jGPdERr3KmlsTo0WJVu646TgUe8ZpxNg%3D&reserved=0 CCCS ITSP.40.062 Guidance on Securely Configuring Network Protocols]  |   | ::*	[https://nam06.safelinks.protection.outlook.com/?url=https://www.cse-cst.gc.ca/en/node/1830/html/26507&data=02|01|Jamie.Hart@microsoft.com|7503434d3e8c4c8cc23808d68d7d1039|72f988bf86f141af91ab2d7cd011db47|1|0|636851965624128440&sdata=TDPmXQvqrn0jGPdERr3KmlsTo0WJVu646TgUe8ZpxNg%3D&reserved=0 CCCS ITSP.40.062 Guidance on Securely Configuring Network Protocols]  | 
|   | ::*	[https://cyber.gc.ca/en/guidance/cloud-service-provider-information-technology-security-assessment-process-itsm50100 CCCS ITSM.50.100 Cloud Service Provider Information Technology Security Assessment Process]  |   | ::*	[https://cyber.gc.ca/en/guidance/cloud-service-provider-information-technology-security-assessment-process-itsm50100 CCCS ITSM.50.100 Cloud Service Provider Information Technology Security Assessment Process]  | 
| − | ::*	[https://intranet.canada.ca/wg-tg/cagc-angc-eng.asp Guidance on Cloud Authentication for the Government of Canada]  | + | ::*	[https://www.canada.ca/en/government/system/digital-government/digital-government-innovations/cloud-services/guideline-cloud-authentication.html Guideline on Cloud Authentication]  | 
|   | ::*	[https://intranet.canada.ca/wg-tg/rtua-rafu-eng.asp Recommendations for Two-Factor User Authentication Within the Government of Canada Enterprise Domain]  |   | ::*	[https://intranet.canada.ca/wg-tg/rtua-rafu-eng.asp Recommendations for Two-Factor User Authentication Within the Government of Canada Enterprise Domain]  | 
|   | ::*	[https://www.gcpedia.gc.ca/gcwiki/images/e/e3/GC_Event_Logging_Strategy.pdf GC Event Logging Strategy (Draft)]  |   | ::*	[https://www.gcpedia.gc.ca/gcwiki/images/e/e3/GC_Event_Logging_Strategy.pdf GC Event Logging Strategy (Draft)]  | 
| Line 83: | 
Line 100: | 
|   |  |   |  | 
|   | == Cloud Security Initiative ==  |   | == Cloud Security Initiative ==  | 
| − | Learn recommendations and actions that your Department can implement to protect your networks through the Treasury Board Secretariat’s Cyber Security initiative  [https://www.gcpedia.gc.ca/wiki/Cloud_Security_Initiative Cloud Security Intiative]    | + | Learn recommendations and actions that your Department can implement to protect your networks through the Treasury Board Secretariat’s Cyber Security initiative  [https://www.gcpedia.gc.ca/wiki/Cloud_Security_Initiative Cloud Security Initiative]    | 
|   | </big></big>  |   | </big></big>  | 
|   | {{GC Cloud Information Centre Footer}}  |   | {{GC Cloud Information Centre Footer}}  | 
|   | __FORCETOC__  |   | __FORCETOC__  |